Generate enterprise-grade SSH keys and load them into an agent for control
of all kinds of Linux hosts. Script the agent with the Parallel Distributed
Shell (pdsh) to effect rapid changes over your server farm.

I’ve written about and trained folks on various DevOps tools through the years, and
although they’re awesome, it’s obvious that most of them are designed from the
mind of a developer. There’s nothing wrong with that, because approaching
configuration management programmatically is the whole point. more>>

A few articles ago, I started a Sysadmin 101 series to pass down some fundamental
knowledge about systems administration that the current generation of junior
sysadmins, DevOps engineers or “full stack” developers might not
learn otherwise.
I had thought that I was done with the series, but then the WannaCry
malware came out and exposed some of the poor patch management practices still more>>

Phishing is one of the most dangerous threats to modern
computing. Phishing attacks have evolved from sloppily written mass email
blasts to targeted attacks designed to fool even the most cautious
users. No defense is bulletproof, and most experts agree education and
common sense are the best tools to combat the problem. more>>

Technology platforms in the post-millennial era are heavily characterized by their use of automation and optimization techniques. As we increasingly analyze our software in order to quantify and qualify what applications and data workloads work well in situation A, we can start to automate an element of other software deployments with managed optimized controls in […]

This blog post looks at the most important control plane components of a single Kubernetes master node — etcd, the API server, the scheduler and the controller manager — and explains how they work together. Although other components, such as DNS and the dashboard, come into play in a production environment, the focus here is […]

To successfully deal with open source security, you need your developers (and DevOps teams) to operate the solution. Given the fast pace of modern development, boosted in part by the use of open source itself, an outnumbered security team will never be able to keep you secure. Therefore, the SCA solution you choose must be designed for […]

Names set expectations. Your project's name should showcase its functionality in the ecosystem and explain to users what your story is. In the crowded open source software world, it's important not to get entangled with other projects out there. Taking a little extra time now, before sending out that big announcement, will pay off later. […]

According to the GitHub’s announcement of its findings, the company looked at three different types of activity. It identified the top 100 projects that had at least 2,000 contributors in 2016 and experienced the largest increase in contributors in 2017. It also identified the top 100 projects that received the largest increase in visits to the […]